Skip to main content
  • Conference proceedings
  • © 2008

Information Security and Privacy

13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5107)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (34 papers)

  1. Front Matter

  2. New Paradigms for Password Security

    • Xavier Boyen
    Pages 1-5
  3. Secure Biometric Authentication with Improved Accuracy

    • Manuel Barbosa, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa
    Pages 21-36
  4. A Critical Analysis and Improvement of AACS Drive-Host Authentication

    • Jiayuan Sui, Douglas R. Stinson
    Pages 37-52
  5. Comparing the Pre- and Post-specified Peer Models for Key Agreement

    • Alfred Menezes, Berkant Ustaoglu
    Pages 53-68
  6. Efficient One-Round Key Exchange in the Standard Model

    • Colin Boyd, Yvonne Cliff, Juan Gonzalez Nieto, Kenneth G. Paterson
    Pages 69-83
  7. On the Improvement of the BDF Attack on LSBS-RSA

    • Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo
    Pages 84-97
  8. Public-Key Cryptosystems with Primitive Power Roots of Unity

    • Takato Hirano, Koichiro Wada, Keisuke Tanaka
    Pages 98-112
  9. Distributed Verification of Mixing - Local Forking Proofs Model

    • Jacek CichoÅ„, Marek Klonowski, MirosÅ‚aw KutyÅ‚owski
    Pages 128-140
  10. Fully-Simulatable Oblivious Set Transfer

    • Huafei Zhu
    Pages 141-154
  11. Efficient Disjointness Tests for Private Datasets

    • Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang
    Pages 155-169
  12. Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary

    • Arpita Patra, Ashish Choudhary, Madhu Vaidyanathan, C. Pandu Rangan
    Pages 170-186
  13. Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers

    • Debra L. Cook, Moti Yung, Angelos D. Keromytis
    Pages 187-202
  14. Multidimensional Linear Cryptanalysis of Reduced Round Serpent

    • Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg
    Pages 203-215
  15. Cryptanalysis of Reduced-Round SMS4 Block Cipher

    • Lei Zhang, Wentao Zhang, Wenling Wu
    Pages 216-229
  16. On the Unprovable Security of 2-Key XCBC

    • Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
    Pages 230-238
  17. Looking Back at a New Hash Function

    • Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin
    Pages 239-253
  18. Non-linear Reduced Round Attacks against SHA-2 Hash Family

    • Somitra Kumar Sanadhya, Palash Sarkar
    Pages 254-266

Other Volumes

  1. Information Security and Privacy

About this book

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008.

The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access